General
-
Target
64d9597adb9df9f9639d679625ce44f0_JaffaCakes118
-
Size
1.3MB
-
Sample
240521-1gpxesbc5z
-
MD5
64d9597adb9df9f9639d679625ce44f0
-
SHA1
0995b131d1caa8c08ed543dba50248cffa019ff2
-
SHA256
23017cf18a4b707769ced016570ab097c5561f742ad9511a3d2f4871ebced3d6
-
SHA512
0c42c5a2fd4ed2dd1522a116ac71f227c72df0fadfbad65e46078e996908fa9dfc909eefa7ab4e29adff430c10d94c23e14fe2907d7b934e612c083682e8d7d0
-
SSDEEP
24576:OoL0otaYtXMheC8X3lUKfcfIkuovSp0ojro+H8j/qZq/13tdHbZKm51Ob83L:dQ7YtbX1wvTvSpLjncj/qZq/1XHNKmjH
Static task
static1
Behavioral task
behavioral1
Sample
64d9597adb9df9f9639d679625ce44f0_JaffaCakes118.apk
Resource
android-x86-arm-20240514-en
Behavioral task
behavioral2
Sample
64d9597adb9df9f9639d679625ce44f0_JaffaCakes118.apk
Resource
android-x64-20240514-en
Malware Config
Targets
-
-
Target
64d9597adb9df9f9639d679625ce44f0_JaffaCakes118
-
Size
1.3MB
-
MD5
64d9597adb9df9f9639d679625ce44f0
-
SHA1
0995b131d1caa8c08ed543dba50248cffa019ff2
-
SHA256
23017cf18a4b707769ced016570ab097c5561f742ad9511a3d2f4871ebced3d6
-
SHA512
0c42c5a2fd4ed2dd1522a116ac71f227c72df0fadfbad65e46078e996908fa9dfc909eefa7ab4e29adff430c10d94c23e14fe2907d7b934e612c083682e8d7d0
-
SSDEEP
24576:OoL0otaYtXMheC8X3lUKfcfIkuovSp0ojro+H8j/qZq/13tdHbZKm51Ob83L:dQ7YtbX1wvTvSpLjncj/qZq/1XHNKmjH
-
Queries account information for other applications stored on the device
Application may abuse the framework's APIs to collect account information stored on the device.
-
Queries information about running processes on the device
Application may abuse the framework's APIs to collect information about running processes on the device.
-
Queries information about the current Wi-Fi connection
Application may abuse the framework's APIs to collect information about the current Wi-Fi connection.
-
Registers a broadcast receiver at runtime (usually for listening for system events)
-
Checks if the internet connection is available
-
Queries the unique device ID (IMEI, MEID, IMSI)
-
Reads information about phone network operator.
-